Android telephones might be hacked simply by somebody understanding your telephone quantity • Graham Cluley

0
828
Android telephones might be hacked simply by somebody understanding your telephone quantity • Graham Cluley


Android phones can be hacked just by someone knowing your phone number

Well, this isn’t good.

Google has issued a warning that some Android telephones might be hacked remotely, with out the supposed sufferer having to click on on something.

If an assault is profitable, the hacker may entry information going by way of the Samsung Exynos chipsets utilized in many gadgets, scooping up name info and textual content messages.

And what does a hacker have to find out about you to focus on your telephone?

Your telephone quantity.

That’s it. All they should know is your Android gadget’s telephone quantity.

Frankly, that’s horrific. It’s simple to think about how such a safety drawback might be exploited by – oh, I don’t know – state-sponsored hackers.

EmailSign as much as our publication
Security information, recommendation, and suggestions.

In all, safety boffins working in Google’s Project Zero crew say that they’ve uncovered a complete of 18 zero-day vulnerabilities in some telephones’ built-in Exynos modem – with 4 of the vulnerabilities being significantly extreme:

Tests carried out by Project Zero verify that these 4 vulnerabilities enable an attacker to remotely compromise a telephone on the baseband degree with no person interplay, and require solely that the attacker know the sufferer’s telephone quantity. With restricted further analysis and growth, we consider that expert attackers would be capable to shortly create an operational exploit to compromise affected gadgets silently and remotely.

According to the researchers, the opposite vulnerabilities require both a malicious cell community operator or an attacker with bodily entry to the Android gadget.

Vulnerable gadgets embrace:

  • Samsung smartphones, together with these within the S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12 and A04 sequence;
  • Vivo smartphones, together with these within the S16, S15, S6, X70, X60 and X30 sequence;
  • Google Pixel 6 and Pixel 7 gadgets; and
  • any automobiles that use the Exynos Auto T5123 chipset.

It’s value noting that some gadgets will probably be utilizing the Qualcomm chipset and modem, which doesn’t undergo from the identical vulnerabilities because the one from Exynos.

Of course, Google’s Project Zero vulnerability-hunters don’t have any qualms about going into nice element of how safety holes might be exploited, and usually shares such info 90 days publicly after informing related software program or {hardware} distributors of the issue.

In this case, nevertheless, Google’s crew seems to recognise that public disclosure at this stage may really trigger important issues:

Under our normal disclosure coverage, Project Zero discloses safety vulnerabilities to the general public a set time after reporting them to a software program or {hardware} vendor. In some uncommon instances the place we now have assessed attackers would profit considerably greater than defenders if a vulnerability was disclosed, we now have made an exception to our coverage and delayed disclosure of that vulnerability.

Due to a really uncommon mixture of degree of entry these vulnerabilities present and the velocity with which we consider a dependable operational exploit might be crafted, we now have determined to make a coverage exception to delay disclosure for the 4 vulnerabilities that enable for Internet-to-baseband distant code execution.

If you’ve gotten an affected Google Pixel gadget, there’s excellent news. Google has already issued a safety patch in your smartphone with its March 2023 safety replace.

However, in case you’re the proprietor of a susceptible Samsung smartphone, fixes nonetheless aren’t accessible in accordance with not less than one Google Project Zero researcher.

So what must you do in case your gadget hasn’t been patched?

Google’s advice is that you just change your gadget’s settings to change off Wi-Fi calling and Voice over LTE (VoLTE), till a repair in your smartphone is offered.

Found this text fascinating? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we submit.


Graham Cluley is a veteran of the anti-virus trade having labored for a lot of safety firms for the reason that early Nineteen Nineties when he wrote the primary ever model of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an unbiased safety analyst, he often makes media appearances and is an international public speaker on the subject of laptop safety, hackers, and on-line privateness.
Follow him on Twitter at @gcluley, on Mastodon at @[email protected], or drop him an e mail.

LEAVE A REPLY

Please enter your comment!
Please enter your name here